IT best practices
Introduction
By using LPP resources, you agree to comply with the operating rules of the LPP and of the various institutions hosting us, including acceptance of the corresponding IT charters, which are available on our intranet under the “IT” section.
In particular, it is strictly forbidden to connect external devices (e.g., personal computers) to the LPP wired network.
General security rules
The proper functioning of our IT systems is extremely important, and we ask for your help in preserving it by following standard cybersecurity best practices:
Use good judgment.
Verify the sender whenever possible.
Only enter your password on web pages you are absolutely certain are legitimate.
Never share your password with anyone.
Do not randomly click on email attachments or unfamiliar web pages.
Do not install the VPN on a personal computer—only on an LPP computer.
Ensure compliance with the law by not installing software without a valid license and by not illegally downloading, storing, or sharing files (movies, music, or any other copyrighted content).
If you are unsure about a web page or an email, contact the IT team for advice.
If you believe you may have provided your credentials to a malicious party, notify the IT team immediately.
Credential theft (Phishing)
WARNING: Fraudulent credential theft campaigns (phishing) are frequent and may closely imitate official emails. Under no circumstances should you enter your credentials (LPP, CNRS, Polytechnique, SU, or others) on an unidentified or unknown website.
If you believe you have been tricked, contact the IT team immediately.
If an email asks you to visit a website to “verify” your credentials: BE CAUTIOUS!
Even if the link appears legitimate, it is almost always fraudulent. It is very easy for malicious actors to disguise a link behind seemingly legitimate text.
➡ ALWAYS verify the actual URL behind a link, regardless of the displayed text or image.
Use your common sense without moderation: your employer, our supervisory institutions, your bank, and the LPP IT team already know who you are!
Why would they ask you to verify your credentials?
Because the wolf has covered his paws with flour and is pretending to be mother goat.
Don’t let him in!
We rely on your vigilance
The last thing we need is a cyberattack.
When it comes to viruses, computers are like humans: they transmit them to one another.
It only takes one mistake for your colleagues’ computers to become infected as well.
If that were to happen, we would be forced to take protective measures on the LPP network, including disabling remote access and, if necessary, shutting down servers and the services they host until the issue is resolved.
We therefore rely on you to comply with all the guidelines provided here, communicated by email, or included in our official charters—especially regarding password security and remote access, which is authorized only from an LPP computer.
Thank you for your common sense and vigilance,
The LPP IT Team